CVE-2010-2596
libtiff: assertion failure on downsampled OJPEG file
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input."
La función OJPEGPostDecode en tif_ojpeg.c en LibTIFF v3.9.0 y v3.9.2, tal y como se utiliza en tiff2ps, permite a atacantes remotos provocar una denegación de servicio (por falta de confirmación y salida de la aplicación) a través de una imagen TIFF debidamente modificada. Se trata de una vulnerabilidad relacionada con "downsampled OJPEG input".
The libtiff packages contain a library of functions for manipulating Tagged Image File Format files. A heap-based buffer overflow and a use-after-free flaw were found in the tiff2pdf tool. An attacker could use these flaws to create a specially crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code. Multiple buffer overflow flaws were found in the gif2tiff tool. An attacker could use these flaws to create a specially crafted GIF file that could cause gif2tiff to crash or, possibly, execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-07-01 CVE Reserved
- 2010-07-01 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://bugzilla.maptools.org/show_bug.cgi?id=2209 | X_refsource_confirm | |
http://marc.info/?l=oss-security&m=127731610612908&w=2 | Mailing List | |
http://secunia.com/advisories/40422 | Third Party Advisory | |
http://secunia.com/advisories/50726 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=583081 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-201209-02.xml | 2013-05-15 | |
https://access.redhat.com/security/cve/CVE-2010-2596 | 2014-02-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=610759 | 2014-02-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 3.9.0 Search vendor "Libtiff" for product "Libtiff" and version "3.9.0" | - |
Affected
| ||||||
Libtiff Search vendor "Libtiff" | Libtiff Search vendor "Libtiff" for product "Libtiff" | 3.9.2 Search vendor "Libtiff" for product "Libtiff" and version "3.9.2" | - |
Affected
|